Section 4.2 Flashcards

1
Q

_______ is a frontline defense against malware not just viruses.

A

Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What works with a really mathematical process called hashing?

A

Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You take any length of an input and send it through a mathematical process and you get an output. This is known as what?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

25-32 characters long with letters and numbers. Anytime you put the same input you get the same output. The Anti-Virus works by the group sending hashes for known software/malware. Then every time your computer tries to download a file, or music, or picture it hashes the ones and zeros that makes the program see if any of the hashes are on the list. It will tell you that you may not want to download or open it. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The anti-virus can only protect you from the malware it knows about. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You need to update your antivirus regularly because it can only protect you from the malware it knows about. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One company might call something a virus, while another says worm, ransomeware, etc. This means that Norton and Microsoft will all have different answers. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile Devices are causing malware to become a bigger deal. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware for mobile phones will probably go up because people don’t think about having anti-virus on their cell phone. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steven Morris created the Morris worm because he was _______ just trying to figure out what he could do.

A

Curious/ Creativity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Somebody upset you so you will give them some ransomeware.

A

Revenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Elk Cloner- it was just a _____ but it spread rapidly.

A

Prank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Status/Respect

A

Fame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomeware can be very big monetary value. Bitcoin has made it harder to investigate. Key loggers can result in good ________.

A

Income

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Takes a lot a knowledge to create your own malware form scratch. True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you go on the dark web you will find malware for sale. You can buy it and customize it to your particular goal.

A

Markets for Malware

17
Q

Somebody is looking to DDoS a company, but I need a botnet, so I find a botnet master and use their botnet to do your work.

A

Renting Botnet

18
Q

USA Computer Fraud and Abuse Act is a really big computer crime law passed in the 80’s and has been revised and updated since. Most computer crimes and punishments are listed here. True or False

A

True

19
Q

For malware you can serve years in prison for using malware. True or False

A

True

20
Q

UK: Computer Misuse Act 1990 and Police Justice Act 2006. They criminalize creation and distribution of malware, profiting off of malware. The penalties vary but you can serve years in prison here. Some countries have no law against malware. True or False

A

True

21
Q

Many countries have no laws and it makes enforcement very difficult. True or False

A

True

22
Q

I love you virus in the early 2000. 16 year old Philomena kid and there was no law against what he did in the Philippines. True or False

A

True